Recent posts
Utilizing BTunnel For Data Exfiltration
Utilizing BTunnel to create tunnels without detections in order to exfiltrate data and to have persistence across the...
Compromising Open Source Password Safes
You might come accross Keepass or PWSafe during your assessment, have you ever tried cracking them?
Abusing GitHub File Upload Feature via GitHub Comments
GitHub has a functionality of uploading files when you create comments in repositories which can be abused by the thr...
Abusing Cloudflared - A Proxy Service To Host/Share Applications
Cloudflared can be used to host phishing sites, hide your maliciouness behind cloudflare owned subdomain and bypass s...
Malware Analysis Resources
A list of my community resources for learning Malware Analysis.